CVE-2022-49387

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49387
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49387.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49387
Downstream
Published
2025-02-26T02:11:21.804Z
Modified
2025-11-28T16:50:22.835347Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
watchdog: rzg2l_wdt: Fix 32bit overflow issue
Details

In the Linux kernel, the following vulnerability has been resolved:

watchdog: rzg2l_wdt: Fix 32bit overflow issue

The value of timercycleus can be 0 due to 32bit overflow. For eg:- If we assign the counter value "0xfff" for computing maxval.

This patch fixes this issue by appending ULL to 1024, so that it is promoted to 64bit.

This patch also fixes the warning message, 'watchdog: Invalid min and max timeout values, resetting to 0!'.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49387.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2cbc5cd0b55fa2310cc557c77b0665f5e00272de
Fixed
e07b9fa0dc32b492de85528caaf9f0c605d8424f
Fixed
b95a47667d34e76c2c9013f8e3b1e5039a5a0b76
Fixed
ea2949df22a533cdf75e4583c00b1ce94cd5a83b

Affected versions

v5.*

v5.16
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.17.1
v5.17.10
v5.17.11
v5.17.12
v5.17.13
v5.17.14
v5.17.2
v5.17.3
v5.17.4
v5.17.5
v5.17.6
v5.17.7
v5.17.8
v5.17.9
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.18.1
v5.18.2
v5.18.3

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.15
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4